Opendata, web and dolomites

H2020 projects about "malicious"

The page lists 45 projects related to the topic "malicious".

# achronym  title  year 
1 DCM Distributed Cryptography Module 2014
2 SERECA Secure Enclaves for REactive Cloud Applications 2015
3 CYBERNETS Cybernetic Communication Networks: Fundamental Limits and Engineering Challenges 2015
4 REVEN-X1 REVEN-X1: Automatic Vulnerability Detection in Binary 2015
5 ACCORD Algorithms for Complex Collective Decisions on Structured Domains 2015
6 WATERGUARD Safeguarding Water Distribution Systems from Contamination Threats using the SmartTap Platform 2015
7 ENCASE EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors 2016
8 CITADEL Critical Infrastructure Protection using Adaptive MILS 2016
9 POWVER Power to the People. Verified. 2016
10 EPoCH Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks 2016
11 SURE Safe Unmanned Robotic Ensembles 2016
12 SecTrap Critical urban infrastructure and soft target cyber attack protection. Users and application Behavioural Analysis supported by artificial intelligence to preempt security cyber attacks. 2016
13 Eye-O-T Cyber security system with a high IoT network visibility and fast vulnerability detection for Smart Homes. 2016
14 HoloCyt A rapid, low-cost, cervical cancer screening platform 2017
15 KEEPERS Keepers: The Key to your Child’s Safety 2017
16 GICA Geolocalisation of Individuals in Critical Areas 2017
17 DeciTrustNET Trust based Decision Support Systems for Social Networks with Uncertain Knowledge 2017
18 BOXMATE Mining Sandboxes for Automatic App Protection 2017
19 GHOST Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control 2017
20 REDSENTRY Proactive Operational Intelligence Cybersecurity Platform for the Financial Services Industry 2017
21 COUNTERCRAFT Intelligence campaigns in the digital realms 2017
22 NTSC New Techniques for Secure Computation 2017
23 AV-SMP Algorithmic Verification of String Manipulating Programs 2017
24 TFence A patent pending solution/microchip for the IoT cybersecurity market requirements: no access toonline software updates, very small size, inexpensive hardware, low energy consumption. 2017
25 CHARIOT Cognitive Heterogeneous Architecture for Industrial IoT 2018
26 SealedGRID Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID 2018
27 Browsec Foundations and Tools for Client-Side Web Security 2018
28 CYBER-TRUST Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things 2018
29 PHILOS PHILOS: Real-time Detection and Automated Mitigation of BGP Prefix Hijacking Attacks 2019
30 ELVER Engineering with Logic and Verification: Mathematically Rigorous Engineering for Safe and Secure Computer Systems 2018
31 Intigriti The Ethical Hacking Platform - Sharing Economy for Security Testing 2018
32 Ammune Mitigating botnet DDoS attacks with an artificial intelligence powered solution 2018
33 PRISENODE PRISENODE: Privacy- and secuRity-aware solutIons in SoftwarE-defiNed fOg Data cEnter 2020
34 C4IIoT Cyber security 4.0: protecting the Industrial Internet Of Things 2019
35 COMP4DRONES Framework of key enabling technologies for safe and autonomous drones’ applications 2019
36 e-DNA BotStop e-DNA BotStop 2019
37 SOCCRATES SOC & Csirt Response to Attacks & Threats based on attack defence graphs Evaluation Systems 2019
38 CyberSANE Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures 2019
39 AT2 Asynchronous Trustworthy Transactions 2019
40 CARAMEL Artificial Intelligence based cybersecurity for connected and automated vehicles 2019
41 RAVEN Routing Attack Vulnerability Evaluation for Networks 2020
42 Ngrave The World’s Most Secure Cryptocurrency Safeguarding Solution 2019
44 TNT Truth-not-Trust 2020
45 CAESAR Integrating Safety and Cybersecurity through Stochastic Model Checking 2020